Analysis
-
max time kernel
97s -
max time network
139s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
27-12-2024 17:08
Static task
static1
Behavioral task
behavioral1
Sample
OneStopShop.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
BoostTool.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
Data/Avatar/logo.png
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
Data/Banners/logo.png
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
Data/Output/[nigga] [2024-10-01] [2x 1 Month]/Failed.txt
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral6
Sample
settings.json
Resource
win10ltsc2021-20241211-en
General
-
Target
settings.json
-
Size
708B
-
MD5
8c2156c75bce66d2a127253d89d4e79f
-
SHA1
8277586c8f3f9d38e819a5266c4a935386ea782f
-
SHA256
8a6f038eb95031a66b34c9ec4b69ad091a8c75b8716fb42ddf6dbee6c73b1c76
-
SHA512
334aff4e0cd7cd1b75668a0fb3e8ae0519172285196a8ce72c421e5bc9a1bee8807ed94637a6bf00dcfdf9e763002470de1593fccbcbeb6e19edca8a2ad48880
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4432 OpenWith.exe